LogoLogo
  • Master security
  • OWNER
  • Disclaimer !
  • 🛡️ O‘zbekiston Respublikasi qonunchiligi doirasida axloqiy xakerlik (Ethical Hacking)
    • Axloqiy xakerlik nima ?
    • Axloqiy xakerlikda shartnoma: huquqiy asos, tuzilma va amaliyot
    • Namuna shartnoma
  • Darslar va ualrni bitirgandan so'ng qanday sertifikat olish mumkin ?
  • 12 Oylik bepul kiberxavfsizlik o‘quv Rejasi: Noldan mutaxassislik sari
  • 1 -Daraja Asosiy Bilimlar (Foundations)
    • Kompyuter arxitekturasi
    • Operatsion tizimlar
    • Kompyuter tarmoqlari CISCO
      • CCNAv7 Introduction to Networks
        • Basic Switch and End Device Configuration
        • Protocols and Models
        • Physical Layer
        • Number Systems
        • Data Link Layer
        • Ethernet Switching
        • Network Layer
        • Address Resolution
        • Basic Router Configuration
        • IPv4 Addressing
        • IPv6 Addressing
        • ICMP
        • Transport Layer
        • Application Layer
        • Network Security Fundamentals
        • Build a Small Network
      • CCNAv7 Switching, Routing, and Wireless Essentials
        • Basic Device Configuration
        • Switching Concepts
        • VLANs
        • Inter-VLAN Routing
        • STP Concepts
        • EtherChannel
        • DHCPv4
        • SLAAC and DHCPv6
        • UntitledFHRP Concepts
        • LAN Security Concepts
        • Switch Security Configuration
        • WLAN Concepts
        • WLAN Configuration
        • Routing Concepts
        • IP Static Routing
        • Troubleshoot Static and Default Routes
      • CCNAv7 Enterprise Networking, Security, and Automation
        • 1 - Single-Area OSPFv2 Concepts
        • 2 - Single-Area OSPFv2 Configuration
        • 3 - Network Security Concepts
        • 4 - ACL Concepts
        • 5 - ACLs for IPv4 Configuration
        • 6 - NAT for IPv4
        • 7 - WAN Concepts
        • 8 - VPN and IPsec Concepts
        • 9 - QoS Concepts
        • 10 - Network Management
        • 11 - Network Design
        • 12 - Network Troubleshooting
        • 13 - Network Virtualization
        • 14 - Network Automation
    • SQL va malumotlar bazasi
      • MySQL
        • Page 8
      • PostgreSQL
        • Page 5
      • Microsoft SQL Server
        • Page 9
    • Linux va Server Konfiguratsiyasi:
      • Mundarija
    • Linux tarmoq sozlamalari WHT hacker
      • Mavzular
    • Windows cmd
      • Mavzu
      • Page
    • C dasturlash tili
    • C++ Dasturlash tili
      • Page 4
    • Bash script (To‘liq Professional Qo‘llanma)
      • Mavzular ro'yxati
        • 1-Bo'lim
          • 1- Bash nima va nima uchun axloqiy xakerlar uchun muhim?
          • 2- Unix/Linux shell turlari va ularning farqi
          • 3- Terminal interfeysi va komandalar arxitekturasi
          • 4- Etik xakerlik va skriptlash: real bog‘liqlik
          • Kernel nima ?
        • 2- Bo'lim
          • 5 - Shebang (#!/bin/bash) va skript boshlanishi
          • 6- Fayl va kataloglar bilan ishlash: cd, pwd, ls, mkdir, rmdir
          • 7-Fayl tarkibini ko‘rish: cat, less, head, tail
          • 8 - Fayl va kataloglarni nusxalash va ko‘chirish: cp, mv, rm
          • 9- Qidirish- find, locate, which, whereis
          • 10 - Matn qidirish: grep, egrep, fgrep
          • 11- Fayllarni tartiblash va formatlash: sort, uniq, cut, awk, sed
          • 12 - Taxalluslar (alias) va history bilan samarali ishlash
          • 13 - Yo‘naltirish operatorlari: >, >>, <, 2>, |
        • 3-Bo'lim
          • Page 11
        • 4-Bo'lim
          • Page 12
        • 5-Bo'lim
          • Page 13
        • 6-Bo'lim
          • Page 14
        • 7-Bo'lim
          • Page 15
        • 8-Bo'lim
          • Page 16
        • 9-Bo'lim
          • Page 17
        • 10-Bo'lim
          • Page 18
    • Assembly
      • Kerakli qo'llanmalar o'zbek tilida hammasi
    • Python asoslari
      • Mundarija :
    • Windows Server va Windows Foydalanuvchilari uchun PowerShell Skriptlari Asoslari
      • Page 1
  • 2 -Daraja Axborot xavfsizligi asoslari
    • Kiber xafsizlik va xaborot xafsizligi asoslari.
      • Mundarija
      • Kiberxavfsizlikning ta’rifi va maqsadlari
      • Kiberxavfsizlikning Tarixiy Rivojlanishi
      • Axborot xavfsizligining iqtisodiy ahamiyati
    • CyberOps
      • 1 - The Danger
      • 2 - Fighters in the War Against Cybercrime
      • 3 - The Windows Operating System
      • 4 - Linux Overview
      • 5 - Network Protocols
      • 6 - Ethernet and Internet Protocol (IP)
      • 7 - Connectivity Verification
      • 8 - Address Resolution Protocol
      • 9 - The Transport Layer
      • 10 - Network Services
      • 11 - Network Communication Devices
      • 12 - Network Security Infrastructure
      • 13 - Attackers and Their Tools
      • 14 - Common Threats and Attacks
      • 15 - Network Monitoring and Tools
      • 💀16 - Attacking the Foundation
      • 17 - Attacking What We Do
      • 18 - Understanding Defense
      • 19 - Access Control
      • 20 - Threat Intelligence
      • 21 - Cryptography
      • 22 - Endpoint Protection
      • 23 - Endpoint Vulnerability Assessment
      • 24 - Technologies and Protocols
      • 25 - Network Security Data
      • 26 - Evaluating Alerts
      • 27 - Working with Network Security Data
      • 28 - Digital Forensics and Incident Analysis and Response
    • DevSecOps
    • Network Defense
    • OSINT
    • Social Engineering
    • Front-end texnologiyalari Axloqiy Xakerlik
      • Page 3
    • Python va Axloqiy Xakerlik
      • Mundarija hammasi
    • .NET C# (Windows malware programing)
      • C# dasturlash tili va .NET platformasi bo‘yicha kirish
      • C# 10 Sintaksisi qisqacha
      • C# da Output nima ?
      • C# da Comments
    • Web Application Security
  • 3 - Daraja Amaliy Hujum va Himoya (Hands-on Offensive & Defensive)
    • CEH / OSCP Pracktical labaratory
    • Red/Blue Team
    • Bug bounty
    • SOC (Security Operations Center build)
    • Exploit developing
    • Post Exploitation
    • Reverse Engineering
    • Practical Malware Analysis
    • Threat Intelligence
    • Honeypot va deception
    • Web Application security
    • Mobile Application Security
    • Cloud Security
    • AI for Cybersecurity
    • Zero Trust
    • Risk management
    • ISO 27001 / SOC II
    • Cryptography I (Stanford)
    • Cyber Law & Policy, GDPR
    • Rust Programming (yangi xavfsiz til)
  • 4 Daraja - Advanced & Specialist Track
    • A -> Exploit Developer bo‘lish uchun
    • B -> Malware Analyst bo‘lish uchun
    • C -> Cloud Security mutaxassisi
    • D -> SCADA/OT sohasiga kirish
  • DevOps pentest
    • Physical PenTest 101
    • SCADA/OT Practical Industrial Control Systems
  • Xalqaro darajadagi maxsus suhbatlarga tayyorgarlik.
  • IoT hacking my lovley step
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. 1 -Daraja Asosiy Bilimlar (Foundations)
  2. Kompyuter tarmoqlari CISCO
  3. CCNAv7 Switching, Routing, and Wireless Essentials

LAN Security Concepts

PreviousUntitledFHRP ConceptsNextSwitch Security Configuration

Was this helpful?